Browse > Article
http://dx.doi.org/10.13106/jafeb.2021.vol8.no6.0491

Battling the Threat of Workplace Harassment: An Appraisal Based on Protection Motivation Theory  

ATTA, Ana (Department of Management Sciences, Faculty of Management Sciences, Balochistan University of Information Technology Engineering & Management Sciences)
ZAMAN, Nadeem uz (Department of Management Sciences, Faculty of Management Sciences, Balochistan University of Information Technology Engineering & Management Sciences)
KHAN, Hadi Hassan (Department of Management Sciences, Faculty of Management Sciences, Balochistan University of Information Technology Engineering & Management Sciences)
Publication Information
The Journal of Asian Finance, Economics and Business / v.8, no.6, 2021 , pp. 491-504 More about this Journal
Abstract
This study attempts to look at workplace harassment through an entirely novel lens of protection motivation theory. The theory suggests the appraisal of threat and the coping ability determine an individual's protection behavior. In this study, we have examined how the threat of harassment affects employees' behaviors. This study utilized cross-sectional research design and quantitative information through an online survey using a two-step approach from 563 employees of different organizations worldwide. It analyzed using partial least square structural equation modeling (PLS-SEM). Results indicated main two constructs, Threat appraisal (perceived severity, perceived vulnerability) and coping appraisal (response efficacy, self-efficacy), were both found to be positively related to the employee's protection intention and behavior. Besides, employee's intention significantly mediated the threat appraisal and coping appraisal with employee's behavior. Overall, results show the importance of protection motivation theory as a significant and influencing factor in workplace harassment, employees' intention, and behavior. Our study offers a novel and new way to look at the phenomenon of workplace harassment and the process of forming protective behavior in a workplace. The theory can be extended to other workplace threats to develop novel and interdisciplinary views by meteorological change as an exploratory and experimental approach.
Keywords
Protection Motivation Theory; Employees Intention and Behavior; Partial Least Square; Physical Harassment;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Syed, A., Gul, N., Khan, H. H., Danish, M., Haq, S., Sarwar, B., Azhar, U., & Ahmed, W. (2021). The Impact of Knowledge Management Processes on Knowledge Sharing Attitude: The Role of Subjective Norms. The Journal of Asian Finance, Economics, and Business, 8(1), 1017-1030. https://doi.org/10.13106/jafeb.2021.vol8.no1.1017   DOI
2 Zippel, K. S. (2006). The politics of sexual harassment: A comparative study of the United States, the European Union, and Germany. Cambridge University Press.
3 Turnbull, A. (2016). An Analysis of the Organizational Structure of Redstone Test Centers Environmental and Components Test Directorate With Regard to Instrumentation Design Capabilities. https://apps.dtic.mil/sti/citations/AD1030102
4 Umrani, W. A., Kura, K. M., & Ahmed, U. (2018). Corporate entrepreneurship and business performance. PSU Research Review. https://doi.org/10.1108/PRR-12-2016-0011   DOI
5 Ferris, D. L., Chen, M., & Lim, S. (2017). Comparing and contrasting workplace ostracism and incivility. Annual Review of Organizational Psychology and Organizational Behavior, 4, 315-338.   DOI
6 Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125. https://doi.org/10.1057/ejis.2009.6   DOI
7 Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: insights from habit and protection motivation theory. Information & Management, 49(3-4), 190-198. https://doi.org/10.1016/j.im.2012.04.002   DOI
8 Wu, D. (2020). Empirical study of knowledge withholding in cyberspace: Integrating protection motivation theory and theory of reasoned behavior. Computers in Human Behavior, 105, 106229. https://doi.org/10.1016/j.chb.2019.106229   DOI
9 Leather, P., Lawrence, C., Beale, D., Cox, T., & Dickson, R. (1998). Exposure to occupational violence and the buffering effects of intra-oranizational support. Work & Stress, 12(2), 161-178. https://doi.org/10.1080/02678379808256857   DOI
10 Sarstedt, M., Ringle, C. M., Smith, D., Reams, R., & Hair Jr, J. F. (2014). Partial least squares structural equation modeling (PLS-SEM): A useful tool for family business researchers. Journal of Family Business Strategy, 5(1), 105-115. https://doi.org/10.1016/j.jfbs.2014.01.002   DOI
11 Vijayasiri, G. (2008). Reporting sexual harassment: The importance of organizational culture and trust. Gender Issues, 25(1), 43-61. https://doi.org/10.1007/s12147-008-9049-5   DOI
12 Wright, C. V., & Fitzgerald, L. F. (2007). Angry and afraid: Women's appraisal of sexual harassment during litigation. Psychology of Women Quarterly, 31(1), 73-84. https://doi.org/10.1111/j.1471-6402.2007.00332.x   DOI
13 Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review. https://doi.org/10.1108/EBR-11-2018-0203   DOI
14 Zhang, X., Han, X., Dang, Y., Meng, F., Guo, X., & Lin, J. (2017). User acceptance of mobile health services from users' perspectives: The role of self-efficacy and response-efficacy in technology acceptance. Informatics for Health and Social Care, 42(2), 194-206. https://doi.org/10.1080/17538157.2016.1200053   DOI
15 Scott, M. (2014). The Reasoning Criminal: Rational Choice Perspectives on Offending (1st ed.). London: Routledge. https://doi.org/10.4324/9781315134482
16 Schnoll, R. A., Calvin, J., Malstrom, M., Rothman, R. L., Wang, H., Babb, J., Miller, S. M., Ridge, J. A., Movsas, B., & Langer, C. (2003). Longitudinal predictors of continued tobacco use among patients diagnosed with cancer. Annals of Behavioral Medicine, 25(3), 214-221. https://doi.org/10.1207/S15324796ABM2503_07   DOI
17 Shiffman, S., Gwaltney, C. J., Balabanis, M. H., Liu, K. S., Paty, J. A., Kassel, J. D., Hickcox, M., & Gnys, M. (2009). Immediate antecedents of cigarette smoking: An analysis from ecological momentary assessment. In: G. A. Marlatt & K. Witkiewitz (Eds.), Addictive behaviors: New readings on etiology, prevention, and treatment (pp. 367-399). American Psychological Association. https://doi.org/10.1037/11855-015
18 Sinclair, R. R., Martin, J. E., & Croll, L. W. (2002). A threat-appraisal perspective on employees' fears about antisocial workplace behavior. Journal of Occupational Health Psychology, 7(1), 37. https://doi.org/10.1037/1076-8998.7.1.37   DOI
19 Witte, K. (1996). Predicting risk behaviors: Development and validation of a diagnostic scale. Journal of Health Communication, 1(4), 317-342. https://doi.org/10.1080/108107396127988   DOI
20 Woon, I., Tan, G., & Low, R. (2005). A Protection Motivation Theory Approach to Home Wireless Security. ICIS. https://aisel.aisnet.org/icis2005/31
21 Feldblum, C. R., & Lipnic, V. A. (2016). Select task force on the study of harassment in the workplace. Washington: US Equal Employment Opportunity Commission. https://www.kutakrock.com/files/Uploads/Images/KCCLE2018_Washkuhn_Handouts.pdf
22 Lee, J. (2018). Passive leadership and sexual harassment. Personnel Review. https://doi.org/10.1108/PR-07-2016-0169   DOI
23 Medlin, J. A. (2012). Domestic violence and working women: The relationship between employment status and women who seek assistance. Capella University. https://search.proquest.com/dissertations-theses/domestic-violence-working-women-relationship/docview/1033334620/se-2?accountid=135034
24 Choi, Y. (2020). A study of role of perceived organizational support among sexual harassment and employees' attitudes. The Journal of Asian Finance, Economics, and Business, 7(2), 229-236. https://doi.org/10.13106/jafeb.2020.vol7.no2.229   DOI
25 Cornish, D. B., & Clarke, R. V. (2014). The reasoning criminal: Rational choice perspectives on offending. Routledge.
26 Das, A. (2009). Sexual harassment at work in the United States. Archives of Sexual Behavior, 38(6), 909-921. https://doi.org/10.1007/s10508-008-9354-9   DOI
27 Durkin, S., Brennan, E., & Wakefield, M. (2012). Mass media campaigns to promote smoking cessation among adults: an integrative review. Tobacco Control, 21(2), 127-138. http://dx.doi.org/10.1136/tobaccocontrol-2011-050345   DOI
28 Ehrenreich, R. (1999). Dignity and discrimination: Toward a pluralistic understanding of workplace harassment. Geo. LJ, 88, 1. https://heinonline.org/HOL/LandingPage?handle=hein.journals/glj88&div=12&id=&page=
29 Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407-429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x   DOI
30 Ramsaroop, A., & Parumasur, S. B. (2007). The prevalence and nature of sexual harassment in the workplace: A model for early identification and effective management thereof. SA Journal of Industrial Psychology, 33(2), 25-33. https://sajip.co.za/index.php/sajip/article/view/374/0
31 Hair, J. F., & Ringle, C. M. (2011). CM, & Sarstedt, M.(2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139-151.   DOI
32 Gale, S., Mordukhovich, I., Newlan, S., & McNeely, E. (2019). The impact of workplace harassment on health in a working cohort. Frontiers in Psychology, 10, 1181. https://doi.org/10.3389/fpsyg.2019.01181   DOI
33 Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. (2006). Multivariate data analysis. Upper Saddle River, NJ: Pearson Prentice Hall.
34 Hair, J. F., , Miller, K.E., Bush, R. P., Ortinau, D. J., Roberts, K., & Lukas, S.-L.. (2014). Marketing research (4th ed.). New York: McGraw-Hill Education
35 Anderson, C. L., & Agarwal, R. (2010). Practising safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 613-643. https://doi.org/https://doi.org/10.2307/25750694   DOI
36 Slovic, P., Fischhoff, B., & Lichtenstein, S. (1980). Facts and fears: Understanding perceived risk. In: Societal risk assessment (pp. 181-216). Springer. https://doi.org/10.1007/978-1-4899-0445-4_9
37 Sperry, J. M., & Nicki, R. M. (1991). Cognitive appraisal, self-efficacy, and cigarette smoking behavior. Addictive Behaviors, 16(6), 381-388. https://doi.org/10.1016/0306-4603(91)90046-K   DOI
38 Tabachnick, B. G., Fidell, L. S., & Ullman, J. B. (2007). Using multivariate statistics (Vol. 5). Boston, MA: Pearson.
39 Rasool, S. F., Wang, M., Zhang, Y., & Samma, M. (2020). Sustainable work performance: the roles of workplace violence and occupational stress. International Journal of Environmental Research and Public Health, 17(3), 912. https://doi.org/10.3390/ijerph17030912   DOI
40 Rogers, K. -A., & Kelloway, E. K. (1997). Violence at work: personal and organizational outcomes. Journal of Occupational Health Psychology, 2(1), 63. https://doi.org/10.1037/1076-8998.2.1.63   DOI
41 Hair, J. F., Ringle, C. M., & Sarstedt, M. (2013). Partial least squares structural equation modeling: Rigorous applications, better results and higher acceptance. Long Range Planning, 46(1-2), 1-12. https://ssrn.com/abstract=2233795   DOI
42 Hair, J. F., & Sarstedt, M. (2019). Factors versus composites: guidelines for choosing the right structural equation modeling method. Project Management Journal, 50(6), 619-624. https://doi.org/10.1177/8756972819882132   DOI
43 Kim, Y. J., & Kim, J. (2020). Does negative feedback benefit (or harm) recipient creativity? The role of the direction of feedback flow. Academy of Management Journal, 63(2), 584-612. https://doi.org/10.5465/amj.2016.1196   DOI
44 Jocoy, C. L., & DiBiase, D. (2006). Plagiarism by adult learners online: A case study in detection and remediation. The International Review of Research in Open and Distributed Learning, 7(1). https://doi.org/10.19173/irrodl.v7i1.242   DOI
45 Kaljee, L. M., Genberg, B., Riel, R., Cole, M., Tho, L. H., Thoa, L. T. K., Stanton, B., Li, X., & Minh, T. T. (2005). Effectiveness of a theory-based risk reduction HIV prevention program for rural Vietnamese adolescents. AIDS Education & Prevention, 17(3), 185-199. https://doi.org/10.1521/aeap.17.4.185.66534   DOI
46 Khan, G., Naveed, R. T., & Jantan, A. H. B. (2018). Status of wonder women: Challenges for young future women entrepreneurs in Pakistan. International Journal of Experiential Learning & Case Studies, 3(1), 97-109. http://dx.doi.org/10.22555/ijelcs.v3i1.1838   DOI
47 Aube, C., Brunelle, E., & Rousseau, V. (2014). Flow experience and team performance: The role of team goal commitment and information exchange. Motivation and Emotion, 38(1), 120-130. htpps://10.1007/s11031-013-9365-2   DOI
48 Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS quarterly, 39(4), 837-864. https://www.jstor.org/stable/26628654   DOI
49 Borrelli, B., Hogan, J. W., Bock, B., Pinto, B., Roberts, M., & Marcus, B. (2002). Predictors of quitting and dropout among women in a clinic-based smoking cessation program. Psychology of Addictive Behaviors, 16(1), 22. https://doi.org/10.1037/0893-164X.16.1.22   DOI
50 Anjum, R., Khan, H. H., Bano, S., Nazir, S., Gulraiz, H., & Ahmed, W. (2021). A Latent Factor (PLS-SEM) Approach: Assessing the Determinants of Effective Knowledge Transfer. The Journal of Asian Finance, Economics, and Business, 8(2), 851-860. https://doi.org/10.13106/jafeb.2021.vol8.no2.0851   DOI
51 Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122. https://doi.org/10.1037/0003-066X.37.2.122   DOI
52 Barling, J., Dupre, K. E., & Kelloway, E. K. (2009). Predicting workplace aggression and violence. Annual Review of Psychology, 60, 671-692. https://doi.org/10.1146/annurev.psych.60.110707.163629   DOI
53 Bilal, M. A., Khan, H. H., Irfan, M., Haq, S., Ali, M., Kakar, A., Ahmed, W., & Rauf, A. (2021). Influence of Financial Literacy and Educational Skills on Entrepreneurial Intent: Empirical Evidence from Young Entrepreneurs of Pakistan. The Journal of Asian Finance, Economics, and Business, 8(1), 697-710. https://doi.org/10.13106/jafeb.2021.vol8.no1.697   DOI
54 Burke, R. J. (2018). Reducing sexual harassment at workplace. Effective Executive, 21(2), 51-56.
55 Chin, W. W. (2010). How to write up and report PLS analyses. In: Handbook of partial least squares (pp. 655-690). Springer. https://doi.org/10.1007/978-3-540-32827-8_29
56 Krieger, N., Waterman, P. D., Hartman, C., Bates, L. M., Stoddard, A. M., Quinn, M. M., Sorensen, G., & Barbeau, E. M. (2006). Social hazards on the job: workplace abuse, sexual harassment, and racial discrimination-a study of black, Latino, and white low-income women and men workers in the United States. International Journal of Health Services, 36(1), 51-85. https://doi.org/10.2190/3EMB-YKRH-EDJ2-0H19   DOI
57 Li, R., Cooper, C., Barber, J., Rapaport, P., Griffin, M., & Livingston, G. (2014). Coping strategies as mediators of the effect of the START (strategies for RelaTives) intervention on psychological morbidity for family carers of people with dementia in a randomised controlled trial. Journal of Affective Disorders, 168, 298-305. https://doi.org/10.1016/j.jad.2014.07.008   DOI
58 Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 469-479. https://doi.org/10.1016/0022-1031(83)90023-9   DOI
59 McDonald, L., Hitzig, S. L., Pillemer, K. A., Lachs, M. S., Beaulieu, M., Brownell, P., Burnes, D., Caspi, E., Mont, J. D., & Gadsby, R. (2015). Developing a research agenda on resident-to-resident aggression: recommendations from a consensus conference. Journal of Elder Abuse & Neglect, 27(2), 146-167. https://doi.org/10.1080/08946566.2014.995869   DOI
60 Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory. Journal of Applied Social Psychology, 30(1), 106-143. https://doi.org/10.1111/j.1559-1816.2000.tb02308.x   DOI
61 Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50. https://doi.org/10.1177/002224378101800104   DOI
62 Chiaburu, D. S., Peng, A. C., Oh, I.-S., Banks, G. C., & Lomeli, L. C. (2013). Antecedents and consequences of employee organizational cynicism: A meta-analysis. Journal of Vocational Behavior, 83(2), 181-197. https://doi.org/10.1016/j.jvb.2013.03.007   DOI
63 Mwagwabi, F. (2015). A Protection Motivation Theory approach to improving compliance with password guidelines. Murdoch University. http://researchrepository.murdoch.edu.au/id/eprint/27070
64 Naveed, A., & Alwani, N. (2010). Sexual harassment at work place: are you safe? Journal of Ayub Medical College, 22(3), 222.
65 Norman, P., Boer, H., & Seydel, E. R. (2005). Protection motivation theory. In: M. Conner, & P. Norman (Eds.), Predicting Health Behaviour: Research and Practice with Social Cognition Models (pp. 81-126). Open University Press.
66 Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295-336.
67 Henseler, J., Ringle, C. M., & Sinkovics, R. R. (2009). The use of partial least squares path modeling in international marketing. In: New challenges to international marketing (pp. 277-319). Emerald Group Publishing Limited.
68 Jenkins, J., Durcikova, A., & Burns, M. (2012). Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior. 2012 45th Hawaii International Conference on System Sciences, 3288-3296.
69 Jenkins, J. L., Grimes, M., Proudfoot, J. G., & Lowry, P. B. (2014). Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time fear appeals. Information Technology for Development, 20(2), 196-213. https://doi.org/10.1080/02681102.2013.814040   DOI
70 Lichtenstein, E., Glasgow, R. E., & Abrams, D. B. (1986). Social support in smoking cessation: In search of effective interventions. Behavior Therapy, 17(5), 607-619. https://doi.org/10.1016/S0005-7894(86)80098-3   DOI
71 Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93-114. https://doi.org/10.1080/00223980.1975.9915803   DOI
72 Pai, H. C., & Lee, S. (2011). Risk factors for workplace violence in clinical registered nurses in Taiwan. Journal of Clinical Nursing, 20(9-10), 1405-1412. https://doi.org/10.1111/j.1365-2702.2010.03650.x   DOI
73 Putri, F. F., & Hovav, A. (2014). Employees' Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory. ECIS.
74 Potter, R., O'Keeffe, V., Leka, S., Webber, M., & Dollard, M. (2019). Analytical review of the Australian policy context for work-related psychological health and psychosocial risks. Safety Science, 111, 37-48. https://doi.org/10.1016/j.ssci.2018.09.012   DOI